CVE-2024-3623: Plaintext Storage of a Password
A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database.
CVE-2024-3623: Plaintext Storage of a Password
Description
A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2024-04-10T18:03:02.203Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ec3739f5a9374a9d10ffb
Added to database: 11/20/2025, 7:29:55 AM
Last updated: 11/20/2025, 7:30:03 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5154: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
HighCVE-2024-3656: Exposure of Sensitive Information to an Unauthorized Actor
HighCVE-2024-3622: Plaintext Storage of a Password
HighCVE-2024-3183: Use of Password Hash With Insufficient Computational Effort
HighCVE-2024-3154: Improper Neutralization of Special Elements used in a Command ('Command Injection')
HighActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.